Before a week security experts from Armis Labs revealed a new attack BlueBorne that affects Nearly All Connected Device. Simply to say if you are having Bluetooth enabled devices then you are vulnerable to BlueBorne attack.
Read More Vulnerability Puts More Than 5 Billion Bluetooth Enabled Devices Under Attack
All the Bluetooth devices mobile, desktop, and IoT operating systems, including Android, iOS, Windows, and Linux are vulnerable.
All Android Devices Phones, tablets, wearables are affected, some of the example devices.
All the windows version Since Windows Vista are infected and Microsoft issued a patch for it on July 11, 2017.
All Linux running BlueZ are affected with information Leakage and version 3.3-rc1 with remote code Execution. Example devices
All the devices with iPhone and iPad devices less than version iOS 9.3.5 are affected and the issue fixed with iOS 10.And AppleTV with version 7.2.2 and lower are affected.
Exploit released by user ojasookert in GitHub. Now you can exploit your Android Devices for vulnerability CVE-2017-0785.
We should have Prerequisites installed Package: libbluetooth-dev to use BlueZ Linux Bluetooth stack.
sudo apt-get install bluetooth libbluetooth-dev
sudo pip install pybluez
sudo pip install pwntools
You can use Blueborne Android Scanner to scan for blueborne-vulnerable Android devices. Once you have found the device and have prerequisites installed you can launch the attack by typing following command.
python CVE-2017-0785.py TARGET=XX:XX:XX:XX:XX:XX
Before Performing this Test, make sure Bluetooth has Turned On and visible with your Target Device.
Recent research has revealed that a Russian advanced persistent threat (APT) group, tracked as "GruesomeLarch"…
Microsoft's Digital Crimes Unit (DCU) has disrupted a significant phishing-as-a-service (PhaaS) operation run by Egypt-based…
The Russian threat group TAG-110, linked to BlueDelta (APT28), is actively targeting organizations in Central…
Earth Kasha, a threat actor linked to APT10, has expanded its targeting scope to India,…
Raspberry Robin, a stealthy malware discovered in 2021, leverages advanced obfuscation techniques to evade detection…
Critical infrastructure, the lifeblood of modern society, is under increasing threat as a new report…
View Comments
What after exploite done ?
What to do which command to apply for further process?